Sciweavers

897 search results - page 128 / 180
» Identity: How to name it, How to find it
Sort
View
118
Voted
PROFES
2004
Springer
15 years 7 months ago
Combining Capability Assessment and Value Engineering: A BOOTSTRAP Example
Process improvement is a challenging task for software engineering. As Kuvaja [7]. has stated it:” It is difficult to find a unique way to identify a common improvement path suit...
Pasi Ojala
HT
2010
ACM
15 years 6 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...
ISSTA
2000
ACM
15 years 6 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...
CANDT
2009
15 years 5 months ago
And the ringleaders were banned: an examination of protest in virtual worlds
Protest has made the jump between the offline and the online spaces and is frequently used in most virtual worlds available today. Despite the frequency of these protest actions i...
Bridget Marie Blodgett
140
Voted
ICC
2007
IEEE
168views Communications» more  ICC 2007»
15 years 5 months ago
Analysis and Optimization of Power Control in Multiuser Cognitive Wireless Networks
In this paper, the problem about power control in multiuser cognitive networks is addressed. The scenario we study is a heterogeneous network, where multiple cognitive (without the...
Peng Cheng, Guanding Yu, Zhaoyang Zhang, Peiliang ...